Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic and Distributed Key Management Scheme for Wireless Sensor Networks., , , , , and . ICC 2016, page 70:1-70:6. ACM, (2016)An Intelligent Approach Based on Cleaning up of Inutile Contents for Extremism Detection and Classification in Social Networks., , , and . ACM Trans. Asian Low Resour. Lang. Inf. Process., 22 (5): 148:1-148:20 (May 2023)A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem., , , , , , and . ICFNDS, page 1:1-1:6. ACM, (2020)Semi-Decentralized Model for Drone Collaboration on Secure Measurement of Positions., , , , , and . ICFNDS, page 64-69. ACM, (2021)Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key., , , , and . J. Inf. Sci. Eng., 39 (1): 183-195 (2023)One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations., , , , and . IACR Cryptol. ePrint Arch., (2023)A new algorithm for finding a dominating set in wireless sensor and IoT networks based on the wait-before-starting concept., , , , and . IEEE SENSORS, page 1-3. IEEE, (2017)Arabic Opinion Mining Using Machine Learning Techniques: Algerian Dialect as a Case of Study., , , and . ICFNDS, page 87-92. ACM, (2022)An adaptive and efficient fully homomorphic encryption technique., , , , , and . ICFNDS, page 35:1-35:6. ACM, (2018)An Intelligent Cloud Data Protection Technique Based on Multi Agent System Using Advanced Cryptographic Algorithms., , , and . ICFNDS, page 21:1-21:7. ACM, (2019)